BIND Name Server Gets Patched Update

The Internet Systems Consortium (ISC), the company behind the open source DNS BIND, software, has released security updates to resolve a DNSSEC-related vulnerability that could lead to Denial-of-Service (DoS) attacks. Read the full article. [The H Security]

The Internet Systems Consortium (ISC), the company behind the open source DNS BIND, software, has released security updates to resolve a DNSSEC-related vulnerability that could lead to Denial-of-Service (DoS) attacks. Read the full article. [The H Security]

Suggested articles

Discussion

  • Anonymous on

    after over 2 years of fighting the original botnet and hacker, i finally seem to be getting help.  it appears that i am the command and control center for the botnet.  there is more to the main worm that needs to be addressed that will end al these hackings.  i am now getting the tech info on HOW.  always new how(by watching it 24/7), but didnt know the technical info till recently.  the best way to explain is that you turn your machine on, and the bot already is workin.  it doesnt need an os(even though it is structured in layers).  each layer rebuilds any tampering of other layers(including global layer)  the hacker originally used DNS name servers for info to spread its backdoor while using conficter as decoy to take blame.  the main worm(undetectable)  uses chips on the motherboard, packets through radio waves.  and then binds onto all drivers in bios in case of formating.   you could not low level format the infected drive if more than 1 drive is active anywhere in the local location.  its more advanced now.  it structures firmware/bios/kernel, drivers in a way that runs independant of the OS.  it uses 2 connections.  first being through the insertected radio packets.  and then gathers info and breaks in starting with adobe popup.   one good news is that through experimnting, winlogon.exe is linkedto the global.  i used windbg.exe and altered the offset and almost killed the global worm.  i learned that it puts info on your hardrives in an alogrithm pattern hoping to recenter itself.  you can view  the worm in memory with less encryption. the worm put a distress call into the kernel that you can see during boot that shows how another part of the worm will replace the global if you succeed.  it mentioned com and is linked to the system configuration boot data.  this is just the begining.  dban just like the other low level formaters errored showing unknown devices and was repeating DAV.    i found a past note showing axel.dav  and data interface.  does anyone know what this means.

     

    also a Process id with no handles, no windows, and also errors programs if they are not set up to detect "no name" processess...

     

    i got lots more info...    also, how do i get a hold of ed gibson, that is who i was told to contact by microsoft ceo or at least claims to be.

     

     

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.